{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T17:36:45Z","timestamp":1730223405201,"version":"3.28.0"},"reference-count":47,"publisher":"IEEE","license":[{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2021,12,1]],"date-time":"2021-12-01T00:00:00Z","timestamp":1638316800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021,12]]},"DOI":"10.1109\/gcwkshps52748.2021.9681964","type":"proceedings-article","created":{"date-parts":[[2022,1,24]],"date-time":"2022-01-24T21:06:05Z","timestamp":1643058365000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["A Survey of Technologies for Building Trusted Networks"],"prefix":"10.1109","author":[{"given":"Loganathan","family":"Parthipan","sequence":"first","affiliation":[]},{"given":"Liqun","family":"Chen","sequence":"additional","affiliation":[]},{"given":"David","family":"Gerault","sequence":"additional","affiliation":[]},{"given":"Yunpeng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Fei","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Christopher J P","family":"Newton","sequence":"additional","affiliation":[]},{"given":"Donghui","family":"Wang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.3390\/s20010147"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICBC51069.2021.9461119"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s11280-021-00869-4"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.3389\/fbloc.2019.00024"},{"article-title":"Polkadot: Vision for a heterogeneous multichain framework","year":"0","author":"wood","key":"ref31"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TEM.2019.2920154"},{"key":"ref37","first-page":"3","article-title":"Stressing out: Bitcoin &#x201D;stress testing","author":"baqer","year":"2016","journal-title":"Financial Cryptography and Data Security"},{"key":"ref36","article-title":"Unsupervised approaches to detecting anomalous behaviour in the bitcoin transaction network","author":"hirshman","year":"2013","journal-title":"Tech Rep"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.14722\/diss.2018.23003"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-58951-6_19"},{"year":"0","key":"ref10","article-title":"Hardware requirements for a device identifier composition engine"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2017.8258365"},{"year":"0","key":"ref11","article-title":"TCG Attestation Working Group"},{"year":"0","key":"ref12","article-title":"TPM2 Architecture"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.14722\/diss.2018.23011"},{"year":"0","key":"ref14","article-title":"TrustZone technology for Armv8-M architecture"},{"year":"0","key":"ref15","article-title":"Intel Software Guard Extensions"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387532"},{"year":"0","key":"ref17","article-title":"Trusted network connect"},{"year":"0","key":"ref18","article-title":"Technical Working Groups"},{"year":"0","key":"ref19","article-title":"Device onboard specification"},{"article-title":"Smart contracts: Building blocks for digital markets","year":"1996","author":"szabo","key":"ref28"},{"year":"0","key":"ref4"},{"article-title":"Ethereum: A secure decentralised generalised transaction ledger","year":"0","author":"wood","key":"ref27"},{"key":"ref3","first-page":"740","article-title":"Trust. making and breaking cooperative relations","volume":"52","author":"gambetta","year":"1990","journal-title":"Tijdschrift Voor Filosofie"},{"key":"ref6","article-title":"Trust modeling and management: From social trust to digital trust","author":"holtmanns","year":"2008","journal-title":"Computer Security Privacy and Politics Current Issues Challenges and Solutions"},{"article-title":"Chain interoperability","year":"0","author":"buterin","key":"ref29"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/OJCOMS.2021.3071496"},{"year":"1985","key":"ref8","article-title":"The Orange Book Series"},{"key":"ref7","first-page":"48","article-title":"A distributed trust model","author":"abdul-rahman","year":"1998","journal-title":"Proceedings of the 1997 workshop on New security paradigms  - NSPW '97"},{"article-title":"Key drivers and research challenges for 6g ubiquitous wireless intelligence (white paper)","year":"2019","author":"aazhang","key":"ref2"},{"article-title":"The Anderson Report","year":"1972","author":"anderson","key":"ref9"},{"journal-title":"3rd Generation Partnership Project (3GPP) Technical Specification (TS)","article-title":"Security architecture and procedures for 5G System","year":"2021","key":"ref1"},{"article-title":"zkSNARKs in a nutshell","year":"0","author":"reitwie\u00dfner","key":"ref46"},{"year":"0","key":"ref20","article-title":"Remote Attestation Procedures (RATS)"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2015.13"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2007.76"},{"year":"0","key":"ref47"},{"year":"0","key":"ref21","article-title":"Introducing the trust over IP foundation"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.24251\/HICSS.2018.443"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/3132259"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2881431"},{"article-title":"Bitcoin: A peer-to-peer electronic cash system","year":"2008","author":"nakamoto","key":"ref23"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/361268.361275"},{"article-title":"A next generation smart contract & decentralized application platform","year":"0","author":"buterin","key":"ref26"},{"key":"ref43","first-page":"18","article-title":"Detecting fraudulent accounts on blockchain: a supervised approach","author":"ostapowicz","year":"2020","journal-title":"International Conference on Web Information Systems Engineering"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"}],"event":{"name":"2021 IEEE Globecom Workshops (GC Wkshps)","start":{"date-parts":[[2021,12,7]]},"location":"Madrid, Spain","end":{"date-parts":[[2021,12,11]]}},"container-title":["2021 IEEE Globecom Workshops (GC Wkshps)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9681915\/9681831\/09681964.pdf?arnumber=9681964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,10]],"date-time":"2022-05-10T16:57:52Z","timestamp":1652201872000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9681964\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,12]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/gcwkshps52748.2021.9681964","relation":{},"subject":[],"published":{"date-parts":[[2021,12]]}}}